Sat.Feb 17, 2024 - Fri.Feb 23, 2024

article thumbnail

Unleashing The B2B Revolution: The Bold Power Of E-Commerce

Forrester IT

Drawing from my personal experience and passion for e-commerce, I am excited to share research on the compelling reasons and effective strategies for B2B organizations to harness this route to market that will propel their organizational growth.

B2B 481
article thumbnail

Changing Role of the CIO

Information Week

Chief information officers need to lean into the leadership aspects of their role to deal with the pace of change that 2024 promises. Here are five strategic areas to focus on this year.

149
149
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Should IT and Security Teams Play a Role in Crisis Communications?

Tech Republic Security

Australian IT and security teams should play key roles in communications during outages and cyber attacks; they also need to be prepared to act when such a tech-related crisis occurs.

Security 168
article thumbnail

Azure and Microsoft Exchange Servers Victim To Active Exploitation by Hackers

IT Toolbox

Microsoft’s Azure platform has been subject to a major data breach, compromising several accounts, including that of senior company executives. Find out more about Microsoft’s security issues with Azure and Exchange servers. The post Azure and Microsoft Exchange Servers Victim To Active Exploitation by Hackers appeared first on Spiceworks.

Microsoft 331
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Slouching Towards Ubiquity: Five Notable Fintech Companies

Forrester IT

Fintech is slouching towards ubiquity (see image below). As it does, fintech will evolve into a broadly held mindset in contrast to being defined as a type of company, a specific set of startups, a category of product types, or a series of new business models.

Company 482
article thumbnail

3 Ways Construction Businesses Can Modernize With No-Code Dynamic Work Management

Social, Agile and Transformation

Ten years ago, I wrote an article for Engineering News Record on how construction businesses underspend in technology. I referenced Gartner’s survey of technology spending by industry, showing construction dead last, which was the same ranking it held the previous year.

More Trending

article thumbnail

3 Significant Ways AI Can Impact Cybersecurity This Year

IT Toolbox

From supercharged social engineering to AI-powered PCs, explore how AI is reshaping cybersecurity this year. The post 3 Significant Ways AI Can Impact Cybersecurity This Year appeared first on Spiceworks.

article thumbnail

What Forrester’s 2024 AI Predictions Mean For Technology Executives

Forrester IT

Thanks to genAI, the era of AI computing is upon us. Backed by decades of development and fueled by billions of dollars in language models, AI infrastructure, and AI-powered applications, technology is taking a massive leap forward.

article thumbnail

5 Best Free Password Managers for 2024

Tech Republic Security

Discover the top free password managers for securely storing and managing your passwords. Learn about their features, benefits and choose the best one for your needs.

Security 177
article thumbnail

Create Custom Roles RBAC in Intune

Anoop

Hello - Here is the new HTMD Blog Article for you. Enjoy reading it. Subscribe to YouTube Channel [link] and Facebook Page to get the latest updates [link] The post Create Custom Roles RBAC in Intune appeared first on HTMD Community Blog #1 Modern Device Management Guides by Malepati Naren.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Efficient Tech Stacks Driving Business Resilience

IT Toolbox

Learn how savvy investments drive business resilience and growth amidst challenging times. The post How Efficient Tech Stacks Driving Business Resilience appeared first on Spiceworks.

Strategy 309
article thumbnail

CMOs: Advancing From GenAI Pilots to Proficiency Doesn’t Come Easy

Forrester IT

The awe and wonder of genAI – instantly generating ad headlines, email copy, images for social posts, quality video, and more – is quickly fading as the complexities of adopting its capabilities into marketing workflows take center stage.

Social 425
article thumbnail

6 Best Open Source IAM Tools in 2024

Tech Republic Security

Explore the top open source IAM (Identity and Access Management) tools, their features and how they can enhance your organization's security and access control.

article thumbnail

Talent Management: The Missing CIO Management Strategy

Information Week

Talent management and development are seldom listed as goals in IT strategic plans. However, is it time for this to change?

Strategy 178
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

3 Metrics CISOs Should Present to the Board and How to Calculate Them

IT Toolbox

Learn how CISOs (chief information security officer) can leverage financial metrics to communicate cybersecurity success effectively to the board. The post 3 Metrics CISOs Should Present to the Board and How to Calculate Them appeared first on Spiceworks.

How To 303
article thumbnail

Build A Human-Centered Productivity Strategy

Forrester IT

Image via Bing Image Creator Today, we’ve released a major new report for clients on employee productivity, Increase Your Organizational Productivity Now. This report builds upon Forrester’s long history of covering productivity as a dimension of Employee Experience, driven by research from my colleague David Brodeur-Johnson.

Strategy 425
article thumbnail

Tenable: Cyber Security Pros Should Worry About State-Sponsored Cyber Attacks

Tech Republic Security

The outing of China-backed threat actor Volt Typhoon and Microsoft’s compromise by Russia-backed Midnight Blizzard provide important cyber security strategy lessons for Australia, says Tenable.

Security 154
article thumbnail

Rethinking AI’s Impact on Software Development and Testing

Information Week

Adoption of artificial intelligence isn’t just about learning from customer data or supporting line workers. It’s already making an impact in software development processes.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Deepfakes Are About to Become a Lot Worse, OpenAI’s Sora Demonstrates

IT Toolbox

OpenAI’s Sora reveals deepfake threats, rising urgent concerns about practical impact on society. The post Deepfakes Are About to Become a Lot Worse, OpenAI’s Sora Demonstrates appeared first on Spiceworks.

article thumbnail

Your Predictions Questions Answered: Leveraging GenAI Successfully 

Forrester IT

During the Predictions 2024 webinar, we got a lot of great questions around how genAI will affect customer-facing functions like marketing, CX, and sales. Check out our answers.

B2B 419
article thumbnail

DVD-like optical disc could store 1.6 petabits (or 200 terabytes) on 100 layers

TechSpot

Researchers at the University of Shanghai for Science and Technology have developed an optical disc with a capacity of over a petabit of data, equivalent to well over 100 terabytes. Although the technology is primarily proposed for enterprise use, it could potentially become accessible to consumers after overcoming significant obstacles.

Research 145
article thumbnail

Salesforce CTrO on Transparency and Trust in the Era of GenAI

Information Week

Cloud software powerhouse Salesforce has a new chief trust officer. InformationWeek asks him about top security and data concerns in IT.

Software 163
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Roundcube Vulnerabilities Exploited by Russian Hackers to Attack More Than 80 Organizations

IT Toolbox

According to researchers, Russian state-backed hackers are exploiting a flaw in Roundcube email servers to collect military and political intelligence from organizations, especially the information associated with the Ukraine conflict. Learn more about the attack. The post Roundcube Vulnerabilities Exploited by Russian Hackers to Attack More Than 80 Organizations appeared first on Spiceworks.

Research 306
article thumbnail

AT&T Outage Shines A Spotlight On Network Dependability

Forrester IT

On February 22nd, a massive service interruption in AT&T cellular services affected subscribers across the nation. Although outage-report volumes were in the hundreds of thousands, that is likely just the tip of the iceberg.

Network 420
article thumbnail

10 Must-Read Books on Cloud Computing

Tech Republic Cloud

It seems like everything from products to rentals to services can be accessed online these days, as we continue to venture deeper and deeper into a world controlled by the cloud. Through cloud computing, computer system applications and resources are provided via the internet, and this trend of online computer service delivery shows no signs.

Cloud 128
article thumbnail

How to Build a Strong IT Risk Mitigation Strategy

Information Week

With threats rapidly multiplying, IT has become inherently risky. A strong risk management strategy minimizes the danger.

Strategy 170
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Major Tech Companies Promise Action to Mitigate AI Risk in Elections

IT Toolbox

Tech companies, such as Meta, X, and Microsoft, have entered an agreement that aims to mitigate the risk of AI interfering in the upcoming U.S. elections. Learn more about the commitments the companies have made to minimize AI interference. The post Major Tech Companies Promise Action to Mitigate AI Risk in Elections appeared first on Spiceworks.

Company 304
article thumbnail

Gemini for Google Workspace Plays The Long Game

Forrester IT

On February 21, Google announced its new generative AI solution for productivity, Gemini for Google Workspace. Previously launched for enterprises as Duet AI for Workspace Enterprise, Gemini for Google Workspace Enterprise keeps the same pricing, at $30/user/month for unlimited usage.

Google 418
article thumbnail

Techstars Seattle is shutting down as accelerator shifts focus to cities with more VC activity

GeekWire

Techstars Seattle managing director Marius Ciocirlan speaks at the accelerator’s Demo Day last month. Techstars announced Wednesday that it is shutting down the Seattle program. (GeekWire Photo / Taylor Soper) Techstars Seattle, one of the first accelerators to emerge from the Techstars program and a longstanding institution within Seattle’s tech ecosystem, is shutting down.

article thumbnail

RAI Institute Founder on Steering AI Systems to Maturity

Information Week

The nonprofit Responsible AI Institute has released its “Maturity Model” to help businesses grade their artificial intelligence efforts considering increasing regulatory demands.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.